Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Anthropomorphism in Technical Presentation

1,431 views

Published on

Published in: Design, Business, Technology
  • Be the first to comment

  • Be the first to like this

Anthropomorphism in Technical Presentation

  1. 1. 1. The Client Computer connects to the Agent. The Agent protects the network by restricting access to only authorized Users.<br />“Hello, Agent. I would like to connect to the network.”<br />“Hello, Client Computer. Please send me a Username for authentication.”<br />User<br />Client<br />Bob<br />Agent<br />Authentication Server<br />The Accused System Does Not Infringe<br />1<br />click to proceed<br />click to proceed<br />
  2. 2. The Accused System Does Not Infringe<br />2. The Client Computer system prompts the User to enter his Username and Password. The Username will be sent to the Server. The Password is known only to the User and the Client Computer. The Password is “locked” to the Client Computer and never sent to the Authentication Server.<br />2<br />Please Enter Username:<br />Bob<br />Bob<br />letMEin23<br />Password:<br />letMEin23<br />User<br />Client<br />Bob<br />letMEin23<br />Agent<br />Authentication Server<br />click to proceed<br />click to proceed<br />
  3. 3. The Accused System Does Not Infringe<br />3. The Client Computer requests authentication from the Agent and sends the Username to the Agent. The Agent forwards the Username to the Authentication Server. The Password is never sent.<br />3<br />“The user named ‘Bob’ wants to join the network. Please authenticate him.”<br />User<br />Client<br />Bob<br />Bob<br />letMEin23<br />Bob<br />Agent<br />Authentication Server<br />click to proceed<br />click to proceed<br />
  4. 4. The Accused System Does Not Infringe<br />4. The Client Computer and the Server negotiate to select a form of authentication. <br />4<br />“Hello, Client. How would you like to authenticate?”<br />User<br />Client<br />Bob<br />letMEin23<br />Agent<br />Authentication Server<br />click to proceed<br />click to proceed<br />
  5. 5. The Accused System Does Not Infringe<br />5. The Client Computer requests authentication that protects the secure nature of the User’s Password.<br />5<br />“I don’t want to send my password, so let’s use PEAP-MS-CHAP-V2”<br />“OK.”<br />User<br />Client<br />Bob<br />letMEin23<br />Agent<br />Authentication Server<br />click to proceed<br />

×